standards and technologies Knowledge and experience of Agile development, tools, and methods Knowledge and experience of applying best practice for solution security. E.g., OWASP, NCSC cloud security principles. Knowledge and experience of applying best practice for handling personal data. E.g., GDPR. Knowledge and experience of Microservices, Webservices and associated technologies more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
the Public Sector. Experience as a Security Architect within a consulting role. Strong proficiency in security best standards and frameworks such as ISO, NIST, NCSC, PCI-DSS etc. Exceptional communication and relationship-building skills with a focus on client satisfaction. UK national, possessing an active DV security clearance. If you more »
and make sound decisions on security-related issues. High standards of personal integrity and trustworthiness. Professional certifications and memberships (e.g., CISSP, ISO27000, CISM, CEH, NCSC, CCP) are highly desirable. ISMS Lead Auditor or ISMS Lead Implementer qualifications are advantageous. Strong background in IT operations, including computer operations, system programming, networking more »
West Midlands, United Kingdom Hybrid / WFH Options
Methods Business and Digital Technology Limited
processes Testing and examining code written by others and analysing results Ensuring that systems are safe and secure against cybersecurity threats Familiar with the NCSC secure design principles Familiar with managing security of cloud platforms, including administration of secrets, tokens and certificates. Working with Architects, Data and Software Engineers to more »
or working towards Certified Information Security Manager (CISM) or SANS GICSP or equivalent information security practitioner level certifications. Familiarity with cloud security principles and NCSC Secure by Design principles. Experience working in a team structure with examples of managing different types of stakeholder relationships across a corporate structure. Experience working more »
for include - Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), MSc Information Security, Achieved Senior or Lead level certification in the NCSC’s Certified Cyber Professional scheme in one or more of Security and Information Risk Advisor (SIRA), IA Architect, IA Auditor, IT Security Officer, Full membership more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq Consulting
CD methodology Relevant vendor certifications (e.g. Microsoft, VMware, Cisco, AWS) Relevant certifications in architecture methodologies Relevant certifications in agile delivery methodologies Practical experience implementing NCSC guidance and best practice Benefits Hybrid working Home/Bristol/Chippenham Discretionary 10% bonus Discretionary annual training fund per employee Car allowance Very competitive more »
a wide range of cybersecurity services to private and public sectors. A CREST and CHECK accredited security business on multiple Crown Supplier + NCSC frameworks, they now require 2 additional BDM's to drive their security services growth. The Role? As a new Business Development Manager you will sell more »
a wide range of cybersecurity services to private and public sectors. A CREST + CHECK accredited security business on multiple Crown Supplier + NCSC frameworks, they now require 2 additional BDM's to drive their security services growth. The Role? As a new Business Development Manager you will sell more »
in investigating security breaches, in delivering security training and awareness initiatives. Must hold certifications in information security i.e. Certified Information Systems Security Professional (CISSP), NCSC IA Architect/SIRA (Senior) or ex-CLAS (current or previously held) Experience of using Agile project delivery toolsets: Jira, Confluence, ServiceNow, CI/CD. more »
Employment Type: Permanent
Salary: £70000 - £85000/annum to £85,000 (DOE) Negotiable, Bonus
provide a critical function in the protection of the UKHSAs digital assets, working closely with wider UKHSA security teams and stakeholders (Government Security Group, NCSC and CPNI) to build a resilient infrastructure, supporting the organisation in reaching its ambition to become a global leader for health security and becomes a more »
including penetration tests, hardware & software compliance, and PCI, and ensure any gaps are addressed. Work with external stakeholders and information security groups including DCMS, NCSC and accreditor organisations and others to improve cybersecurity standards. Oversee the security review of third-party suppliers and systems. Manage the Cyber Essentials, GovAssure more »
Rugby, Warwickshire, West Midlands, United Kingdom
Upbeat Ideas UK Ltd
UK site (subject to COVID regulations and customer requirements). Security Clearance level Restrictions apply. Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps to cybersecurity, MOD CyberSecurity Directives. Any relevant Cybersecurity certifications (SANS, ISACA, ISC2, SSCP, CISSP, GIAC, CISA, CISM) Quickly able to more »
or enterprise patch management tools TenableOne or enterprise vulnerability management tools Sound knowledge of industry best practices such as OWASP, Cybersecurity framework and NCSC guidance more »
UK site (subject to COVID regulations and customer requirements). Security Clearance level Restrictions apply. Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps to cybersecurity, MOD CyberSecurity Directives. Any relevant Cybersecurity certifications (SANS, ISACA, ISC2, SSCP, CISSP, GIAC, CISA, CISM) Quickly able to more »
ordinator: Relevant IT security experience. Writing of accreditation security case (RMADS). Experience and knowledge of Government IA Policy, including JSP440, JSP604, DIANS and NCSC IA guidance. Experience of close working relationships with Accreditation Authorities in the UK, as well as leading Security Working Groups as a way of managing more »
mindset of developing secure systems and act as a subject matter expert in cybersecurity. Experience in working with MOD e.g., CyDR, JSP 604, or NCSC Cybersecurity Assessment Framework, or HMG, or commercial defence and security environments would be an added benefit. Skills and Qualifications Significant experience working in a securitymore »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »